Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Pentesting APIs
  • Table Of Contents Toc
Pentesting APIs

Pentesting APIs

By : Maurício Harley
5 (6)
close
close
Pentesting APIs

Pentesting APIs

5 (6)
By: Maurício Harley

Overview of this book

Understanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively. This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You’ll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces. By the end of this book, you’ll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.
Table of Contents (18 chapters)
close
close
1
Part 1: Introduction to API Security
4
Part 2: API Information Gathering and AuthN/AuthZ Testing
7
Part 3: API Basic Attacks
chevron up
11
Part 4: API Advanced Topics
14
Part 5: API Security Best Practices

Part 3: API Basic Attacks

Now that you have been introduced to basic attacks in Part 2, it’s time to move on and increase your knowledge of more types of attacks. In this part, you will learn about techniques that you must not ignore while targeting APIs. We will discuss adapted SQL and NoSQL injection attacks, the problems caused by bad user input sanitization, what happens when an error is not correctly handled, and finally, the feared denial-of-service attack. You will also be presented with some ways to block or at least reduce the chances of such attacks being successful.

This section contains the following chapters:

  • Chapter 5, Injection Attacks and Validation Testing
  • Chapter 6, Error Handling and Exception Testing
  • Chapter 7, Denial of Service and Rate-Limiting Testing
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Pentesting APIs
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon